Person or element with power to carry out a threat
Threat Actor
The length of time for which a key is authorized for use.
Cryptoperiod
The three most common interception attacks
Man-in-the-Middle
Man-in-the-Browser
Replay
The rules for communication
Protocol
Password weakness is linked to
This malicious software enters a computer system without the owners knowledge or consent.
Malware
The most common asymmetric cryptography algorithm
Rivest-shamir-adleman (RSA)
The three types of attacks that inject "poison" into a normal network process to facilitate an attack
ARP Poisoning
DNS Poisoning
Privilege Escalation
Manages virtual operating systems and supports one or more guest systems
Hypervisor
The two key stretching algorithms
brypt
PBKDF2
Crypto-Malware
The framework that contains entities involved in digital certificate management.
Public Key Infrastructure (PKI)
The attack that takes advantage of procedures for initiating a session
Synchronize Flood Attack (SYN)
Established when a bluetooth device comes within range of another
Piconet
The two unique keystroke variables
Dwell time
Flight Time
Three types of information protection (Often called the CIA triad)
Confidentiality
Integrity
Availability
The three classes of cryptographic algorithms
Hash, Symmetric, Asymmetric
Two basic types of intrusion detection systems
Host Intrusion Detection System (HIDS)
Network Intrusion Detection System (NIDS)
The encryption method for WPA2
Cipher Block Chaining Message Authentication Code Protocol (CCMP)
Individual to whom day-to-day actions have been assigned by the owner
Custodian or Steward
The five fundamental defensive security principles
Layering, Limiting, Diversity, Obscurity, Simplicity
Five basic protections of Cryptography
Confidentiality, Integrity, Authentication, Non-repudiation, Obfuscation
A separate network located outside of the secure network perimeter
Demilitarized Zone (DMZ)
Autonomous AP that manages wireless authentication, encryption, and other functions for wireless devices.
Fat APs
Allows an organization to maintain user profiles in a central database that all remote servers can share.
RADIUS